Thoughtful, detailed coverage of the Mac, iPhone, and iPad, plus the best-selling Take Control ebooks.

 

 

Pick an apple! 
 
Add Slides to Pear Note from Other Applications

If you have some slides in any application, and you'd like to add them to a Pear Note document, there's no need to save them out and then import them into Pear Note. Instead, you can send them directly to Pear Note through a PDF service. For instance, if you had slides in Keynote, just:

  1. Select Print within Keynote.
  2. Click the PDF button.
  3. Select Send PDF to Pear Note.

This can also be used to import other document types into Pear Note to take notes on them as well.

Visit Useful Fruit Software

 
 

Take Control News: Is Your Wireless Network Secure?

Send Article to a Friend

We've just released a new version of "Take Control of Your Wi-Fi Security," penned jointly by wireless networking guru Glenn Fleishman and Take Control publisher Adam Engst. The ebook is aimed at anyone who is running a home or small-office wireless network and who wants to set up and maintain an appropriate security level for their needs and budget. Glenn and Adam have been publishing articles and books about wireless security for ages, so this new version contains the distilled essence of years of thinking about the topic, along with fresh material to bring their discussions up to date for 2009. They have added the latest details relating to Mac OS X 10.5 Leopard, current recommendations for setting up WPA and WPS security, and steps for configuring guest networking with Apple's recently released base stations. To ensure that your wireless network is appropriately secure, pick up a copy of the $10 ebook.

Although the last update to "Take Control of Your Wi-Fi Security" came in October 2007, we're still making this version a free update for anyone who owns a previous edition of the ebook. In your existing PDF, click Check for Updates on the first page to access a download link.

"Take Control of Your Wi-Fi Security" helps you assess your real-world security risk, and aids in evaluating the likelihood of a security-related problem, the potential severity of a break-in, and the opportunity cost of securing your wireless network. It then goes on to explain the pros and cons of various security techniques, explaining how to implement the best ones to secure your network and your data in transit. It covers Mac OS X, Windows XP, and Windows Vista.

 

READERS LIKE YOU! Support TidBITS by becoming a member today!
Check out the perks at <http://tidbits.com/member_benefits.html>
Special thanks to Chris Du Ve, Dale Viljoen, David Embleton, and
WILLIAM STANFORD for their generous support!